Three Rivers Nacho Dip

Thursday, August 7, 2008

Computer Security Tutorial Part #2

Here is yet another guide on computer security?

1.Their are multiple ways to detect trojans on your computer.Lets start with the most obvious.

2.Wireshark is a good program to monitor your internet activity.It lets you know any traffic that is being sent or received

3.How to determine a suspicious program.One obvious way is when a program asks for internet access from your firewall.It will almost always be something disguised as a real program.svchost.exe is a favorite among hackers.Their is a few ways to notice something strange is going on.(A)explorer.exe wants internet access.(B)svchost.exe is asking for internet access after you run program.

4.Ways to trace a hacker.You can use the netstat -b -v command to show all active connections and what the program which it is using.Now their is a IP address that will be next to it as well. Use tracing tools such as neotrace, or visual ip trace.Once you determine the InternetServiceProvider then report them to the noted isp.

5.Hijack this shows all the startup items and browsers files so you can see if any are suspicious that you didn't add yourself.

6.COMODO firewall will detect most common firewall bypass operation so that you can block it when you see it.The common ones to watch for are (A)Injection into your default browser.(B)Injection into your messenger.

7.Last but not least another good idea is to always watch for random computer crashes and internet lag which can be hints onto the fact you've been hacked.

To make a extra 30$ a month join all of the sites noted here: http://shotgunner101.blogspot.com/

Hot swimwear for men